Pub Date : 2021-09-02DOI: 10.1109/ICIRCA51532.2021.9544508
P. Nikhate, A. Deshmukh, Swapnali Choudhari
The proposed research study analyzes several methods to achieve a higher data rate by using past wireless technologies and also enhancing the past technology by working on them and modifying them for achieving a better data flowing rate. This research work is focusing more on the multiple-inputs multiple-outputs(MIMO) system, and by using this system this research study aims to produce a higher data rate, higher data flowing channels by using multiplexing and diversity. Nowadays, wireless technology is on growing so for the future point of view, it is highly required to improve the current data flowing rate properties on the transceiver side. Here, by using both ends of the nodes, a higher data flowing capacity of the wireless system can be achieved with very negligible losses along with consistent quality performance while transporting the data packets from one door to another and getting a quick response through the channel that is modified by using spatial multiplexing and increasing it higher-level up. This spatial multiplexing help undamaged data packets to arrive at the link target as quickly as possible while transmission and due to this the higher data flowing rate can be achieved with a higher data gaining rate by only using the MIMO system. Based on past communication technologies, this study has have determined that Alamouti STBC and ZF equalizer is the best remedy for the analysis of MIMO system to calculate communication diversity including the helping hands of BPSK modulation technique for achieving a better quality result. The Alamouti STBC and ZF equalization technique is used to calculate the BER result and this would be the linear equalization technique that is used to find the receiver nodes on the transceivers. The most important key point is that, all the operations are performing on MATLAB.
{"title":"Study and Analysis in MIMO Wireless Channel for STBC and Equalization Techniques by Using Matlab","authors":"P. Nikhate, A. Deshmukh, Swapnali Choudhari","doi":"10.1109/ICIRCA51532.2021.9544508","DOIUrl":"https://doi.org/10.1109/ICIRCA51532.2021.9544508","url":null,"abstract":"The proposed research study analyzes several methods to achieve a higher data rate by using past wireless technologies and also enhancing the past technology by working on them and modifying them for achieving a better data flowing rate. This research work is focusing more on the multiple-inputs multiple-outputs(MIMO) system, and by using this system this research study aims to produce a higher data rate, higher data flowing channels by using multiplexing and diversity. Nowadays, wireless technology is on growing so for the future point of view, it is highly required to improve the current data flowing rate properties on the transceiver side. Here, by using both ends of the nodes, a higher data flowing capacity of the wireless system can be achieved with very negligible losses along with consistent quality performance while transporting the data packets from one door to another and getting a quick response through the channel that is modified by using spatial multiplexing and increasing it higher-level up. This spatial multiplexing help undamaged data packets to arrive at the link target as quickly as possible while transmission and due to this the higher data flowing rate can be achieved with a higher data gaining rate by only using the MIMO system. Based on past communication technologies, this study has have determined that Alamouti STBC and ZF equalizer is the best remedy for the analysis of MIMO system to calculate communication diversity including the helping hands of BPSK modulation technique for achieving a better quality result. The Alamouti STBC and ZF equalization technique is used to calculate the BER result and this would be the linear equalization technique that is used to find the receiver nodes on the transceivers. The most important key point is that, all the operations are performing on MATLAB.","PeriodicalId":245244,"journal":{"name":"2021 Third International Conference on Inventive Research in Computing Applications (ICIRCA)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126699669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-02DOI: 10.1109/ICIRCA51532.2021.9544996
Thangam Palaniswamy
Skeletal bone age assessment (BAA) is a commonly employed clinical practice used for the diagnosis of endocrine and metabolic illness in child growth. BAA approach generally starts with the acquisition of the X ray image of the left hand from the wrist to fingertip. The bones in the X ray image undergo comparison with the radiological images that exist in the standard atlas of bone development. Since manual methods are time consuming and erroneous, the recently developed deep learning (DL) models find useful in the design of automated BAA using X ray images. In this view, this paper presents a new DL empowered automated BAA (DL-ABAA) model using X ray images. The proposed DL-ABAA model performs initial preprocessing to improve the image quality. Followed by Fast region convolutional neural network (Fast-RCNN) with VGG-19 model-based feature extractor is involved for deriving the features from the input X ray images. At the same time, shuffled frog leaf optimization (SFLO) algorithm is utilized as a hyperparameter optimizer of the VGG-19 model. In addition, softmax (SM) based age prediction and extreme gradient boosting (XGBoost) based stage classification processes are applied to predict the age and determine the class labels. A detailed experimental results analysis stated the improved performance of the BAA technique over the recent approaches with the higher accuracy of 96.53%.
{"title":"Deep Learning Empowered Automatic Bone Age Assessment","authors":"Thangam Palaniswamy","doi":"10.1109/ICIRCA51532.2021.9544996","DOIUrl":"https://doi.org/10.1109/ICIRCA51532.2021.9544996","url":null,"abstract":"Skeletal bone age assessment (BAA) is a commonly employed clinical practice used for the diagnosis of endocrine and metabolic illness in child growth. BAA approach generally starts with the acquisition of the X ray image of the left hand from the wrist to fingertip. The bones in the X ray image undergo comparison with the radiological images that exist in the standard atlas of bone development. Since manual methods are time consuming and erroneous, the recently developed deep learning (DL) models find useful in the design of automated BAA using X ray images. In this view, this paper presents a new DL empowered automated BAA (DL-ABAA) model using X ray images. The proposed DL-ABAA model performs initial preprocessing to improve the image quality. Followed by Fast region convolutional neural network (Fast-RCNN) with VGG-19 model-based feature extractor is involved for deriving the features from the input X ray images. At the same time, shuffled frog leaf optimization (SFLO) algorithm is utilized as a hyperparameter optimizer of the VGG-19 model. In addition, softmax (SM) based age prediction and extreme gradient boosting (XGBoost) based stage classification processes are applied to predict the age and determine the class labels. A detailed experimental results analysis stated the improved performance of the BAA technique over the recent approaches with the higher accuracy of 96.53%.","PeriodicalId":245244,"journal":{"name":"2021 Third International Conference on Inventive Research in Computing Applications (ICIRCA)","volume":"17 6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126963562","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-02DOI: 10.1109/ICIRCA51532.2021.9544678
Xiaojing Zhu
A Weibo recommendation algorithm integrating user interests is studied in this manuscript. Among the algorithms based on content similarity recommendation, the LDA algorithm is one of the most used and classic algorithms. Therefore, this paper uses the LDA algorithm to mine the user interest distribution and uses the cosine similarity algorithm to calculate the similarity between the general microblog to be recommended and the user's interest. The proposed algorithm is designed by considering the similarity of user interest based on the semantic level and the similarity of the social relationship based on the follow relationship are then considered, a better recommendation effect can be achieved. To validate the model, the proposed algorithm is simulated on the data collected from the Weibo. The accuracy is higher than before.
{"title":"A Weibo Recommendation Algorithm Integrating User Interests","authors":"Xiaojing Zhu","doi":"10.1109/ICIRCA51532.2021.9544678","DOIUrl":"https://doi.org/10.1109/ICIRCA51532.2021.9544678","url":null,"abstract":"A Weibo recommendation algorithm integrating user interests is studied in this manuscript. Among the algorithms based on content similarity recommendation, the LDA algorithm is one of the most used and classic algorithms. Therefore, this paper uses the LDA algorithm to mine the user interest distribution and uses the cosine similarity algorithm to calculate the similarity between the general microblog to be recommended and the user's interest. The proposed algorithm is designed by considering the similarity of user interest based on the semantic level and the similarity of the social relationship based on the follow relationship are then considered, a better recommendation effect can be achieved. To validate the model, the proposed algorithm is simulated on the data collected from the Weibo. The accuracy is higher than before.","PeriodicalId":245244,"journal":{"name":"2021 Third International Conference on Inventive Research in Computing Applications (ICIRCA)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129236287","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-02DOI: 10.1109/ICIRCA51532.2021.9544519
Himanshu V Vairagade, Vivek Gurve, Neema Ukani, Sandeep R Sonaskar, S. Chakole
Parallel Manipulator is one of the trending research topics in the field of robotics. Recently, the 3-RPS parallel manipulator is widely being used for novel applications. Conventionally, the prismatic actuation is implemented using pneumatic drives. In this paper, a rack and pinion mechanism for prismatic link actuation is proposed. Three different modes of operations and two methods for controls are proposed. To validate the kinematic analysis of this configuration a MATLAB model is developed. To compare the numerical and experimental micro-manipulations two test cases are designed and results are compared.
{"title":"Design and Fabrication of 3-RPS Robot - Rack and Pinion Mechanism","authors":"Himanshu V Vairagade, Vivek Gurve, Neema Ukani, Sandeep R Sonaskar, S. Chakole","doi":"10.1109/ICIRCA51532.2021.9544519","DOIUrl":"https://doi.org/10.1109/ICIRCA51532.2021.9544519","url":null,"abstract":"Parallel Manipulator is one of the trending research topics in the field of robotics. Recently, the 3-RPS parallel manipulator is widely being used for novel applications. Conventionally, the prismatic actuation is implemented using pneumatic drives. In this paper, a rack and pinion mechanism for prismatic link actuation is proposed. Three different modes of operations and two methods for controls are proposed. To validate the kinematic analysis of this configuration a MATLAB model is developed. To compare the numerical and experimental micro-manipulations two test cases are designed and results are compared.","PeriodicalId":245244,"journal":{"name":"2021 Third International Conference on Inventive Research in Computing Applications (ICIRCA)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116892054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-02DOI: 10.1109/ICIRCA51532.2021.9544959
Md. Asraful Haque, N. Ahmad
SRGMs (Software Reliability Growth Models) are the probabilistic and statistical models widely used to evaluate software reliability. They explain how the reliability of the software varies over time by investigating failure data as the testing progresses. The paper presents a new SRGM in an imperfect debugging environment. The proposed model considers that with time, the fault detection rate will increase gradually. Also, the new model is tested with a real dataset that is available in public domain and compared the results with seven existing models in terms of four goodness-of-fit criteria.
{"title":"An Imperfect SRGM based on NHPP","authors":"Md. Asraful Haque, N. Ahmad","doi":"10.1109/ICIRCA51532.2021.9544959","DOIUrl":"https://doi.org/10.1109/ICIRCA51532.2021.9544959","url":null,"abstract":"SRGMs (Software Reliability Growth Models) are the probabilistic and statistical models widely used to evaluate software reliability. They explain how the reliability of the software varies over time by investigating failure data as the testing progresses. The paper presents a new SRGM in an imperfect debugging environment. The proposed model considers that with time, the fault detection rate will increase gradually. Also, the new model is tested with a real dataset that is available in public domain and compared the results with seven existing models in terms of four goodness-of-fit criteria.","PeriodicalId":245244,"journal":{"name":"2021 Third International Conference on Inventive Research in Computing Applications (ICIRCA)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116949142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-02DOI: 10.1109/ICIRCA51532.2021.9544775
Ch. V. Bhargavi, G. Mani, Naresh Cherukuri, C. Prasad, Azmira Krishna, C. Z. Basha
Covid-19 virus has changed the total life style of human beings. This coivd-19 started in the country china and spread all over the world. World health organization (WHO) suggested the face masks to be covered which can reduce the spread of corona virus. All countries made it compulsory to wear masks to cut-off the covid spread. Hence detection of wearing masks or not has become an important area to work on for computer vision. Many woks are being done on face mask detection, but mostly basis on the classification of mask and no-mask. Here in this paper. a novel approach is proposed which not only classifies mask and no-mask people, but also identifies whether a mask is properly covered or not. Thus in this paper use of R-CNN (Convolution Neural Network) is proposed which results to achieve an accuracy up to 0.93.
{"title":"A Novel Framework for Facemask Detection Using R-Convolution Neural Network","authors":"Ch. V. Bhargavi, G. Mani, Naresh Cherukuri, C. Prasad, Azmira Krishna, C. Z. Basha","doi":"10.1109/ICIRCA51532.2021.9544775","DOIUrl":"https://doi.org/10.1109/ICIRCA51532.2021.9544775","url":null,"abstract":"Covid-19 virus has changed the total life style of human beings. This coivd-19 started in the country china and spread all over the world. World health organization (WHO) suggested the face masks to be covered which can reduce the spread of corona virus. All countries made it compulsory to wear masks to cut-off the covid spread. Hence detection of wearing masks or not has become an important area to work on for computer vision. Many woks are being done on face mask detection, but mostly basis on the classification of mask and no-mask. Here in this paper. a novel approach is proposed which not only classifies mask and no-mask people, but also identifies whether a mask is properly covered or not. Thus in this paper use of R-CNN (Convolution Neural Network) is proposed which results to achieve an accuracy up to 0.93.","PeriodicalId":245244,"journal":{"name":"2021 Third International Conference on Inventive Research in Computing Applications (ICIRCA)","volume":"640 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116086592","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-02DOI: 10.1109/ICIRCA51532.2021.9544920
B. Babu, Poojitha Tatineni, L. I, C. Prasad, Hema Chindu, Bala Bhaskara Rao Emani
This research work introduces a novel Decentralized Query Protocol called “The Graph” for indexing and caching data from blockchain and other such storage networks. This research work describes the query interface, topology of P2P network, economic incentives and mechanisms that are designed to keep the network running as a public utility. This research work will probably deliver “The Graph” across three significant improvement achievements. The primary delivery will be a free help that any dApp engineer can enlist to utilize. It will incorporate stable interfaces for characterizing the Schema, enrolling Mappings, and questioning with GraphQL. Dispatching first as a brought together help will permit us to emphasize on the plan, execution, and financial motivations at a quicker rate. The subsequent achievement will be the dispatch of the full P2P network. After this delivery, anybody will actually want to run a Graph Node and acquire Graph Tokens for taking part in the organization. This is the stage at which the Query Marketplace just as the Indexing and Caching Marketplace will be opened. The third significant delivery will incorporate help for Private Data. Private Data is secured on-chain however scrambled and constrained by clients.
{"title":"The Graph - A Decentralized Query Protocol for Block chain Technology","authors":"B. Babu, Poojitha Tatineni, L. I, C. Prasad, Hema Chindu, Bala Bhaskara Rao Emani","doi":"10.1109/ICIRCA51532.2021.9544920","DOIUrl":"https://doi.org/10.1109/ICIRCA51532.2021.9544920","url":null,"abstract":"This research work introduces a novel Decentralized Query Protocol called “The Graph” for indexing and caching data from blockchain and other such storage networks. This research work describes the query interface, topology of P2P network, economic incentives and mechanisms that are designed to keep the network running as a public utility. This research work will probably deliver “The Graph” across three significant improvement achievements. The primary delivery will be a free help that any dApp engineer can enlist to utilize. It will incorporate stable interfaces for characterizing the Schema, enrolling Mappings, and questioning with GraphQL. Dispatching first as a brought together help will permit us to emphasize on the plan, execution, and financial motivations at a quicker rate. The subsequent achievement will be the dispatch of the full P2P network. After this delivery, anybody will actually want to run a Graph Node and acquire Graph Tokens for taking part in the organization. This is the stage at which the Query Marketplace just as the Indexing and Caching Marketplace will be opened. The third significant delivery will incorporate help for Private Data. Private Data is secured on-chain however scrambled and constrained by clients.","PeriodicalId":245244,"journal":{"name":"2021 Third International Conference on Inventive Research in Computing Applications (ICIRCA)","volume":"188 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116145028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-02DOI: 10.1109/ICIRCA51532.2021.9544895
G. C. Kumar, D. Prasad, V. Rao, N. Sai
The emergence of distributed computing with adaptability, improved access to information and cost savings makes this innovation available and rapidly developing. Due to the rise in distributed computing, companies are turning to used distributed computing. Despite the fact that distributed computing offers countless benefits to customers, the above review reveals that the entry of distributed computing to healthcare remains low. With a compelling cloud risk assessment system, cloud customers will get assurance from this innovation. Study on the approach to assessing the dangers of the cloud that is still an infant and the complexity of distinguishing the security dangers that are actually being discussed. This article investigates the hazard assessment measure by introducing the technique into the hazard assessment measure. The hazard assessment is a key step in the hazard assessment measurement. Analyze the outcome of the hazard investigation measure and decide whether to recognize or support the hazard rules to resolve the hazard review. From our investigation, the NGTechinque is familiarized with thinking about examining the dangers that the previous stage causes. Since the hazard assessment depends on the authorized destinations, the internal and external environment and the perspectives of the partners, NGT promises convincing results. Not only does this review add to the focus on synthesizing dangers and dangers in a systematic way, but implicitly, the NGT measure makes partners which are aware of the current threatening circumstances for security cloud in the partnership. Equivalent freedom of communication is seen in this center which fulfills expectations and can produce a splendid disposition in the results of the risk assessment.
{"title":"Utilization of Nominal Group Technique for Cloud Computing Risk Assessment and Evaluation in Healthcare","authors":"G. C. Kumar, D. Prasad, V. Rao, N. Sai","doi":"10.1109/ICIRCA51532.2021.9544895","DOIUrl":"https://doi.org/10.1109/ICIRCA51532.2021.9544895","url":null,"abstract":"The emergence of distributed computing with adaptability, improved access to information and cost savings makes this innovation available and rapidly developing. Due to the rise in distributed computing, companies are turning to used distributed computing. Despite the fact that distributed computing offers countless benefits to customers, the above review reveals that the entry of distributed computing to healthcare remains low. With a compelling cloud risk assessment system, cloud customers will get assurance from this innovation. Study on the approach to assessing the dangers of the cloud that is still an infant and the complexity of distinguishing the security dangers that are actually being discussed. This article investigates the hazard assessment measure by introducing the technique into the hazard assessment measure. The hazard assessment is a key step in the hazard assessment measurement. Analyze the outcome of the hazard investigation measure and decide whether to recognize or support the hazard rules to resolve the hazard review. From our investigation, the NGTechinque is familiarized with thinking about examining the dangers that the previous stage causes. Since the hazard assessment depends on the authorized destinations, the internal and external environment and the perspectives of the partners, NGT promises convincing results. Not only does this review add to the focus on synthesizing dangers and dangers in a systematic way, but implicitly, the NGT measure makes partners which are aware of the current threatening circumstances for security cloud in the partnership. Equivalent freedom of communication is seen in this center which fulfills expectations and can produce a splendid disposition in the results of the risk assessment.","PeriodicalId":245244,"journal":{"name":"2021 Third International Conference on Inventive Research in Computing Applications (ICIRCA)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116179936","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-02DOI: 10.1109/ICIRCA51532.2021.9544810
G. Gupta, M. Pavan, K. S. Ruthwik, M. Revanth, A. T
Our globe is being impacted by a variety of calamities, some of which are natural and others which are manmade. The past decades have witnessed the occurrence of many types of natural and man-made disasters like Earthquakes, Tsunamis, Wildfires, EBOLA outbreak and currently COVID-19. These disasters have been claiming a lot of lives and in fact the number is very huge. Some lives could be saved if there is a better and faster aid in terms of help or immediate response from the officials or people nearby. Natural disasters cannot be controlled by humans but the number of deaths in other types of disasters could be controlled by us. Mainly, due to EBOLA and COVID-19 many people lost their lives because of lack of immediate support and aid. More than 10,000 deaths were accounted for by the EBOLA outbreak and now due to COVID-19, one of the most destructive viruses that ever lived on the earth, recorded figures much higher than that of EBOLA, nearly 3.17 million people left this world as of now. Now in this pandemic situation many are losing their lives because of the scarcity in medical equipment and also no proper transportation especially ambulance service. To overcome this situation this application supports the person who needs help by sending emergency alerts to the surrounding people for seeking help. This SOS application is capable of saving many lives through which an immediate aid and support can be obtained from the nearby people.
{"title":"A proximity aware android SOS application in times of pandemic","authors":"G. Gupta, M. Pavan, K. S. Ruthwik, M. Revanth, A. T","doi":"10.1109/ICIRCA51532.2021.9544810","DOIUrl":"https://doi.org/10.1109/ICIRCA51532.2021.9544810","url":null,"abstract":"Our globe is being impacted by a variety of calamities, some of which are natural and others which are manmade. The past decades have witnessed the occurrence of many types of natural and man-made disasters like Earthquakes, Tsunamis, Wildfires, EBOLA outbreak and currently COVID-19. These disasters have been claiming a lot of lives and in fact the number is very huge. Some lives could be saved if there is a better and faster aid in terms of help or immediate response from the officials or people nearby. Natural disasters cannot be controlled by humans but the number of deaths in other types of disasters could be controlled by us. Mainly, due to EBOLA and COVID-19 many people lost their lives because of lack of immediate support and aid. More than 10,000 deaths were accounted for by the EBOLA outbreak and now due to COVID-19, one of the most destructive viruses that ever lived on the earth, recorded figures much higher than that of EBOLA, nearly 3.17 million people left this world as of now. Now in this pandemic situation many are losing their lives because of the scarcity in medical equipment and also no proper transportation especially ambulance service. To overcome this situation this application supports the person who needs help by sending emergency alerts to the surrounding people for seeking help. This SOS application is capable of saving many lives through which an immediate aid and support can be obtained from the nearby people.","PeriodicalId":245244,"journal":{"name":"2021 Third International Conference on Inventive Research in Computing Applications (ICIRCA)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114243755","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-09-02DOI: 10.1109/ICIRCA51532.2021.9544516
Bhavani H N, R. V, P. K. Namboori
Colorectal cancer is a type of cancer which affects colon and rectum and it is one among the prominent cause of mortality due to cancer. Drugs are developed to cure colorectal cancer after rigorous process of clinical trials, but efficiency of drug or survival rate remains low. Analysis of interactions between proteins and drugs through network study helps in discovering uncovered interaction between proteins in a pathway. Colorectal cancer can affect the digestive tract lower end can begin with non-cancerous polyps with no symptoms, but these polyps can be detected by screening. The symptoms may vary from person to person depends upon the location of cancer, some may affect with irregular bowel habits, blood in stool, and abdominal irritation. The treatment of cancer also banks on the location of cancer which includes removal of tumor, surgery or radiation and chemotherapy. Proposed approach describes about cytoscape analysis in the genes. Analysis explores the inhibition of protein present in the TGB which can prevent the tumor in the network.
{"title":"Analysis of the role of Transforming Growth Factor Beta (TGF-B) Receptors in Colorectal Cancer (CRC)-A bio-molecular networking approach","authors":"Bhavani H N, R. V, P. K. Namboori","doi":"10.1109/ICIRCA51532.2021.9544516","DOIUrl":"https://doi.org/10.1109/ICIRCA51532.2021.9544516","url":null,"abstract":"Colorectal cancer is a type of cancer which affects colon and rectum and it is one among the prominent cause of mortality due to cancer. Drugs are developed to cure colorectal cancer after rigorous process of clinical trials, but efficiency of drug or survival rate remains low. Analysis of interactions between proteins and drugs through network study helps in discovering uncovered interaction between proteins in a pathway. Colorectal cancer can affect the digestive tract lower end can begin with non-cancerous polyps with no symptoms, but these polyps can be detected by screening. The symptoms may vary from person to person depends upon the location of cancer, some may affect with irregular bowel habits, blood in stool, and abdominal irritation. The treatment of cancer also banks on the location of cancer which includes removal of tumor, surgery or radiation and chemotherapy. Proposed approach describes about cytoscape analysis in the genes. Analysis explores the inhibition of protein present in the TGB which can prevent the tumor in the network.","PeriodicalId":245244,"journal":{"name":"2021 Third International Conference on Inventive Research in Computing Applications (ICIRCA)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128022415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}